Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Robert Grimmick

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims...

Read More

ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks

ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll...

Read More

What is C2? Command and Control Infrastructure Explained

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence...

Read More

Endpoint Detection and Response: All You Need to Know About EDR Security

Endpoints – the laptops, smartphones, and other devices we use on a daily basis – are a favorite target of attackers. They’re everywhere, prone to security vulnerabilities, and difficult to...

Read More

IPv6 Security Guide: Do you Have a Blindspot?

IPv6, the most recent iteration of the ubiquitous Internet Protocol, promises to solve a forthcoming shortfall of available IP addresses. But the latest generation of IP will also have profound...

Read More

What Is Network Segmentation?

Simply put, network segmentation is the act of dividing a computer network into smaller physical or logical components. Two devices on the same network segment can talk to each other...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.